SG11201607650QA - Systems and methods for detecting copied computer code using fingerprints - Google Patents

Systems and methods for detecting copied computer code using fingerprints

Info

Publication number
SG11201607650QA
SG11201607650QA SG11201607650QA SG11201607650QA SG11201607650QA SG 11201607650Q A SG11201607650Q A SG 11201607650QA SG 11201607650Q A SG11201607650Q A SG 11201607650QA SG 11201607650Q A SG11201607650Q A SG 11201607650QA SG 11201607650Q A SG11201607650Q A SG 11201607650QA
Authority
SG
Singapore
Prior art keywords
fingerprints
systems
methods
computer code
copied computer
Prior art date
Application number
SG11201607650QA
Inventor
Daniel Jordan Rogers
Michael Alan Moore
Original Assignee
Terbium Labs LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Terbium Labs LLC filed Critical Terbium Labs LLC
Publication of SG11201607650QA publication Critical patent/SG11201607650QA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/75Structural analysis for program understanding
    • G06F8/751Code clone detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)
  • Debugging And Monitoring (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
SG11201607650QA 2014-03-31 2015-03-26 Systems and methods for detecting copied computer code using fingerprints SG11201607650QA (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201461973125P 2014-03-31 2014-03-31
US14/314,407 US8997256B1 (en) 2014-03-31 2014-06-25 Systems and methods for detecting copied computer code using fingerprints
US14/621,554 US9218466B2 (en) 2014-03-31 2015-02-13 Systems and methods for detecting copied computer code using fingerprints
PCT/US2015/022650 WO2015153260A1 (en) 2014-03-31 2015-03-26 Systems and methods for detecting copied computer code using fingerprints

Publications (1)

Publication Number Publication Date
SG11201607650QA true SG11201607650QA (en) 2016-10-28

Family

ID=52708074

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201607650QA SG11201607650QA (en) 2014-03-31 2015-03-26 Systems and methods for detecting copied computer code using fingerprints

Country Status (6)

Country Link
US (2) US8997256B1 (en)
EP (1) EP3126958B1 (en)
AU (1) AU2015241299B2 (en)
CA (1) CA2942360A1 (en)
SG (1) SG11201607650QA (en)
WO (1) WO2015153260A1 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9459861B1 (en) 2014-03-31 2016-10-04 Terbium Labs, Inc. Systems and methods for detecting copied computer code using fingerprints
US20160042180A1 (en) * 2014-08-07 2016-02-11 Ut Battelle, Llc Behavior specification, finding main, and call graph visualizations
CA2980538A1 (en) * 2015-03-26 2016-09-29 Terbium Labs, Inc. Systems and methods for detecting copied computer code using fingerprints
JP2017010476A (en) * 2015-06-26 2017-01-12 三菱電機株式会社 Similarity determination device, similarity determination method and similarity determination program
US10140287B2 (en) 2015-09-09 2018-11-27 International Business Machines Corporation Scalable and accurate mining of control flow from execution logs across distributed systems
US9547484B1 (en) 2016-01-04 2017-01-17 International Business Machines Corporation Automated compiler operation verification
CN109155736A (en) * 2016-03-21 2019-01-04 利弗莱姆有限公司 Data watermarking and fingerprinting system and method
US10261784B1 (en) 2018-06-20 2019-04-16 Terbium Labs, Inc. Detecting copied computer code using cryptographically hashed overlapping shingles
BR102018077436A2 (en) * 2018-12-28 2020-07-07 Samsung Eletrônica da Amazônia Ltda. forced execution method of flow control integrity in a monolithic binary using static analysis
US11099842B2 (en) * 2019-01-08 2021-08-24 Saudi Arabian Oil Company Source code similarity detection using digital fingerprints
CN110598408B (en) * 2019-08-23 2021-03-26 华中科技大学 App clone detection method and system based on function layer coding
US11972256B2 (en) 2022-02-16 2024-04-30 International Business Machines Corporation Software code analysis using fuzzy fingerprinting

Family Cites Families (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020009208A1 (en) 1995-08-09 2002-01-24 Adnan Alattar Authentication of physical and electronic media objects using digital watermarks
US5559884A (en) 1994-06-30 1996-09-24 Microsoft Corporation Method and system for generating and auditing a signature for a computer program
US5892900A (en) 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6157721A (en) 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US6000030A (en) 1996-06-20 1999-12-07 Emc Corporation Software fingerprinting and branding
US7590853B1 (en) 1996-08-12 2009-09-15 Intertrust Technologies Corporation Systems and methods using cryptography to protect secure computing environments
US6108420A (en) 1997-04-10 2000-08-22 Channelware Inc. Method and system for networked installation of uniquely customized, authenticable, and traceable software application
AU7957998A (en) 1997-06-09 1999-01-25 Intertrust, Incorporated Obfuscation techniques for enhancing software security
WO1999064973A1 (en) 1998-06-10 1999-12-16 Auckland Uniservices Limited Software watermarking techniques
US6966002B1 (en) 1999-04-30 2005-11-15 Trymedia Systems, Inc. Methods and apparatus for secure distribution of software
US7770016B2 (en) 1999-07-29 2010-08-03 Intertrust Technologies Corporation Systems and methods for watermarking software and other media
US7058941B1 (en) 2000-11-14 2006-06-06 Microsoft Corporation Minimum delta generator for program binaries
US7739737B2 (en) * 2003-07-29 2010-06-15 Wisconsin Alumni Research Foundation Method and apparatus to detect malicious software
US8661559B2 (en) 2003-08-18 2014-02-25 Riverside Research Institute Software control flow watermarking
US20090328185A1 (en) * 2004-11-04 2009-12-31 Eric Van Den Berg Detecting exploit code in network flows
US8056138B2 (en) 2005-02-26 2011-11-08 International Business Machines Corporation System, method, and service for detecting improper manipulation of an application
US8046834B2 (en) * 2005-03-30 2011-10-25 Alcatel Lucent Method of polymorphic detection
US20080134326A2 (en) * 2005-09-13 2008-06-05 Cloudmark, Inc. Signature for Executable Code
US8176568B2 (en) 2005-12-30 2012-05-08 International Business Machines Corporation Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system
US20070239993A1 (en) 2006-03-17 2007-10-11 The Trustees Of The University Of Pennsylvania System and method for comparing similarity of computer programs
KR100797024B1 (en) 2006-05-02 2008-01-22 한국전자통신연구원 Method and apparatus for hybrid image watermarking
US8214497B2 (en) 2007-01-24 2012-07-03 Mcafee, Inc. Multi-dimensional reputation scoring
US20100011441A1 (en) * 2007-05-01 2010-01-14 Mihai Christodorescu System for malware normalization and detection
US7912894B2 (en) * 2007-05-15 2011-03-22 Adams Phillip M Computerized, copy-detection and discrimination apparatus and method
WO2009065135A1 (en) 2007-11-17 2009-05-22 Uniloc Corporation System and method for adjustable licensing of digital products
KR100960120B1 (en) 2007-12-17 2010-05-27 한국전자통신연구원 Signature String Storing Memory Structure and the Storing Method for the Same, Signature String Pattern Matching Method
US8533848B2 (en) 2009-02-18 2013-09-10 Korea Advanced Institute Of Science And Technology Method and system for producing multimedia fingerprint based on quantum hashing
CN102012862A (en) 2010-11-09 2011-04-13 北京神舟航天软件技术有限公司 Verification method of compiler based on contrast of logical structures of control flow graphs
US8666999B2 (en) * 2011-08-02 2014-03-04 Rockwell Automation Technologies, Inc. Search utility program for software developers
US20140006375A1 (en) * 2012-07-02 2014-01-02 Andrea G. FORTE Method and apparatus for robust mobile application fingerprinting
US9003529B2 (en) * 2012-08-29 2015-04-07 The Johns Hopkins University Apparatus and method for identifying related code variants in binaries
WO2015060832A1 (en) * 2013-10-22 2015-04-30 Mcafee, Inc. Control flow graph representation and classification
US10747880B2 (en) * 2013-12-30 2020-08-18 University Of Louisiana At Lafayette System and method for identifying and comparing code by semantic abstractions

Also Published As

Publication number Publication date
WO2015153260A1 (en) 2015-10-08
EP3126958A4 (en) 2017-11-08
AU2015241299A1 (en) 2016-11-17
US20150278490A1 (en) 2015-10-01
US9218466B2 (en) 2015-12-22
US8997256B1 (en) 2015-03-31
CA2942360A1 (en) 2015-10-08
EP3126958A1 (en) 2017-02-08
EP3126958B1 (en) 2019-01-23
AU2015241299B2 (en) 2019-11-14

Similar Documents

Publication Publication Date Title
HK1244125B (en) Systems and methods for malicious code detection accuracy assurance
HK1252103A1 (en) Methods and systems for copy number variant detection
SG11201701855RA (en) Systems and methods for liveness analysis
SG11201607650QA (en) Systems and methods for detecting copied computer code using fingerprints
IL249962A0 (en) Malicious code protection for computer systems based on process modification
HK1222744A1 (en) Methods and systems for data analysis and compression
EP3195196A4 (en) Method and fingerprint sensing system for authenticating a candidate fingerprint
ZA201606932B (en) System and method for position detection
GB2559275B (en) Methods and systems for performing actions based on biometric data
ZA201607536B (en) Arrangement and method for identifying fingerprints
EP3121727A4 (en) Information processing device and error detection method
HK1232324A1 (en) Systems, devices, and methods for sample integrity verification
EP2988230A4 (en) Data processing method and computer system
GB201502033D0 (en) Methods and systems for analyzing healthcare data
HK1211122A1 (en) Method and system for processing periodic order information
GB2525248B (en) A computer security system and method
HK1218478A1 (en) Method, device and system for processing interaction information
SG11201609822VA (en) Kick detection systems and methods
HK1211152A1 (en) Method and device for processing biometric information
GB201502289D0 (en) Methods and systems for analyzing financial dataset
SG10201510491QA (en) Methods and systems for flash detection
HK1207451A1 (en) Method for processing data based on query log and system thereof
SG10201403334XA (en) Detection system and method
GB201403896D0 (en) Data processing systems and methods
SG11201707779XA (en) Systems and methods for detecting copied computer code using fingerprints